heroui logo

Unsigned Image Loaded by LSASS

Splunk Security Content

View Source
Summary
The detection rule titled 'Unsigned Image Loaded by LSASS' focuses on identifying the loading of unsigned images by the Local Security Authority Subsystem Service (LSASS) on Windows systems. LSASS is responsible for enforcing security policies on the system, handling the login process, and managing access tokens. This rule is significant as loading unsigned images into LSASS can indicate potentially malicious activity, such as credential dumping, by sophisticated threats. The rule uses Sysmon's Event ID 7, which logs when an image is loaded into memory, applying a filter to track whether these images are signed or unsigned. However, this specific rule has been marked as deprecated due to high noise levels, where legitimate processes may trigger alerts for loading unsigned images, complicating the detection of true threats. Despite its deprecation, it highlights the importance of monitoring LSASS activities and maintaining a balance between security visibility and operational noise reduction.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
  • Process
ATT&CK Techniques
  • T1003.001
Created: 2024-11-14